Analysis
-
max time kernel
62s -
max time network
64s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2025 15:39
Static task
static1
Behavioral task
behavioral1
Sample
2.3_Archive_2.3..zip
Resource
win10v2004-20241007-en
General
-
Target
2.3_Archive_2.3..zip
-
Size
44.7MB
-
MD5
0eb58a649db2fb6e3d0b6e74909fc39c
-
SHA1
e213b8dd944952e83a1f3cec1b8258a3cd4a6d9c
-
SHA256
dd58b9ee5c5437df7d8178272198703854f30cf6c33af260941f78b9550cda1f
-
SHA512
c7e96bbcd856c44d9a63580ac4d77052d51cb284f9d192d4b199ad562baa879505aa921a36caadd70d68a82df19ccbcabbddc1d7dd008faeb6d53efe5572f1c3
-
SSDEEP
786432:Bmn/DnSue4djrzThFmv4Dh0XhyMUqY8Hbgl3WiuxDTTnnbUjK9YnOpX4oR:Bm/bDecrzThooh0XhyMUqY8HJiuxD3+2
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Extracted
lumma
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
Signatures
-
Lumma family
-
Executes dropped EXE 3 IoCs
pid Process 3452 setup.exe 1908 setup.exe 4160 setup.exe -
Loads dropped DLL 3 IoCs
pid Process 3452 setup.exe 1908 setup.exe 4160 setup.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3452 set thread context of 1516 3452 setup.exe 108 PID 1908 set thread context of 4780 1908 setup.exe 112 PID 4160 set thread context of 2020 4160 setup.exe 116 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2644 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 2644 7zFM.exe Token: 35 2644 7zFM.exe Token: SeSecurityPrivilege 2644 7zFM.exe Token: SeSecurityPrivilege 2644 7zFM.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2644 7zFM.exe 2644 7zFM.exe 2644 7zFM.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 3452 wrote to memory of 1516 3452 setup.exe 108 PID 3452 wrote to memory of 1516 3452 setup.exe 108 PID 3452 wrote to memory of 1516 3452 setup.exe 108 PID 3452 wrote to memory of 1516 3452 setup.exe 108 PID 3452 wrote to memory of 1516 3452 setup.exe 108 PID 3452 wrote to memory of 1516 3452 setup.exe 108 PID 3452 wrote to memory of 1516 3452 setup.exe 108 PID 3452 wrote to memory of 1516 3452 setup.exe 108 PID 3452 wrote to memory of 1516 3452 setup.exe 108 PID 3452 wrote to memory of 1516 3452 setup.exe 108 PID 3452 wrote to memory of 1516 3452 setup.exe 108 PID 3452 wrote to memory of 1516 3452 setup.exe 108 PID 3452 wrote to memory of 1516 3452 setup.exe 108 PID 1908 wrote to memory of 4780 1908 setup.exe 112 PID 1908 wrote to memory of 4780 1908 setup.exe 112 PID 1908 wrote to memory of 4780 1908 setup.exe 112 PID 1908 wrote to memory of 4780 1908 setup.exe 112 PID 1908 wrote to memory of 4780 1908 setup.exe 112 PID 1908 wrote to memory of 4780 1908 setup.exe 112 PID 1908 wrote to memory of 4780 1908 setup.exe 112 PID 1908 wrote to memory of 4780 1908 setup.exe 112 PID 1908 wrote to memory of 4780 1908 setup.exe 112 PID 1908 wrote to memory of 4780 1908 setup.exe 112 PID 1908 wrote to memory of 4780 1908 setup.exe 112 PID 1908 wrote to memory of 4780 1908 setup.exe 112 PID 1908 wrote to memory of 4780 1908 setup.exe 112 PID 4160 wrote to memory of 2020 4160 setup.exe 116 PID 4160 wrote to memory of 2020 4160 setup.exe 116 PID 4160 wrote to memory of 2020 4160 setup.exe 116 PID 4160 wrote to memory of 2020 4160 setup.exe 116 PID 4160 wrote to memory of 2020 4160 setup.exe 116 PID 4160 wrote to memory of 2020 4160 setup.exe 116 PID 4160 wrote to memory of 2020 4160 setup.exe 116 PID 4160 wrote to memory of 2020 4160 setup.exe 116 PID 4160 wrote to memory of 2020 4160 setup.exe 116 PID 4160 wrote to memory of 2020 4160 setup.exe 116 PID 4160 wrote to memory of 2020 4160 setup.exe 116 PID 4160 wrote to memory of 2020 4160 setup.exe 116 PID 4160 wrote to memory of 2020 4160 setup.exe 116
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\2.3_Archive_2.3..zip"1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2644
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3004
-
C:\Users\Admin\Downloads\setup.exe"C:\Users\Admin\Downloads\setup.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1516
-
-
C:\Users\Admin\Downloads\setup.exe"C:\Users\Admin\Downloads\setup.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4780
-
-
C:\Users\Admin\Downloads\setup.exe"C:\Users\Admin\Downloads\setup.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42B
MD584cfdb4b995b1dbf543b26b86c863adc
SHA1d2f47764908bf30036cf8248b9ff5541e2711fa2
SHA256d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b
SHA512485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce
-
Filesize
430KB
MD5d62dad7d19fa7be1aaa151ee5a1e9b83
SHA11b59d61def48900bf840922f139449528ef3ef79
SHA25690a567ce30976ece0c2f23d3169dde71d21dc64b9f330e94ea1caf0e63447614
SHA512eba8a042f3278c9a57f6460f1b7f041bd91f6e68917d937679d137d4d332cd0d7748e502976d65af2c3c4b3d4cd13a50ee512b79002bdcd040c0e2f374468034
-
Filesize
491KB
MD54adce8122174f19a12d65979b14d8e60
SHA120499a2f184407f1a790b3b4fb80b05aa63c2c69
SHA2560d4c259791d63fddd69c4883abb54dc46d34427ab3ceefd3500fb09b6fc8454b
SHA512c5a10705e2394be77cf2345e1d507f367af4f5a19e54b00c8430d78240721caefcb0aeab8b1b3137f37d2c791e3b34d3eca440f4567449320c553dc9e1385718